Vulnerability Notification: Red Hat 389 Directory Server nsslapd ldapsearch Buffer Overflow

[Overview] 389 Directory Server is an OpenLDAP-based enterprise LDAP server developed by Red Hat. It is an open source Lightweight Directory Access Protocol (LDAP) service implementation. Red Hat fixes a buffer overflow vulnerability in the latest update. [Vulnerability Details] CVE-2018-1089: This vulnerability is caused by the inability to handle excessively long filter values in ldapsearch…

Hackers don’t sleep; and neither does Hillstone

Breach detection systems focus on malicious activity in a network, therefore they protect entire networks – not isolated endpoints or devices. They can be expensive and also complex, depending on how the network is designed, and as the network expands or changes, so will the solution. Despite the bad rap, the Breach Detection market is…

Vulnerability Notification: Apache Struts 2 namespace Expression Language Injection

[Overview] Apache Struts2 is an MVC framework for building Java-based web applications. In the MVC design pattern, Struts2 acts as a controller to establish data interaction between the model and the view. Recently, Apache Struts2 officially released a security notification of the remote code execution vulnerability fix. [Vulnerability Details] CVE-2018-11776: The Apache Struts2 vulnerability has…

Getting the Right Firewall Protection for Your Data Centre

The explosive growth in data creation and data storage is set to continue, with Asia Pacific’s data center market increasing significantly and even surpassing the European market by 2021, according to Cushman & Wakefield. The surge in data consumption in the region is currently driving the increase, and mobile data usage has increased in Asia…

Vulnerability Notification: Mining Trojans

[Overview] With the rise of virtual currency, a new type of attack – mining Trojans quietly prevailed. Different from the ransomware encrypting user key data and virus Trojan destructing business system, the mining Trojan has no obvious attack characteristics, making it difficult for users to detect. According to statistics, mining Trojans have become one of…